Therefore, the proxy public key y becomes
y = y
h(m
w
1
,r
o
1
)
o
1
r
o
1
···y
h(m
w
n
,r
o
n
)
o
n
r
o
n
y
h(m
w
1
,r
o
1
,y
o
1
,···,m
w
n
,r
o
n
,y
o
n
)
p
mod p.
4.2 Security Analysis
The improved schemes can withstand all the above
attacks in Section 3. In the SNPS scheme, suppose
the signer U
o
is a malicious original signer. U
o
selects
a random integer α and makes her/his public key y
0
o
satisfy the following equation
y
0
o
= g
α
(y
−h(m
w
,r,y
o
)
−1
p
) mod p.
If U
o
fixes the integer y
0
o
, she/he will have to solve
the discrete logarithm problem to find the value of α;
on the other hand, if U
o
first determines the integer
α, then she/he has to obtain the value of y
0
o
by solv-
ing the difficult problem. Therefore, the public key
substitution attack is not likely to work.
As for the directing forgery attack, the secu-
rity analysis is the same as that of the public key
substitution attack on the improved schemes. The
proxy signature cannot be forged by direct forgery at-
tack. Therefore, those attacks on the improved SNPS
scheme and its application to multi proxy signatures
are impossible since it is difficult to obtain the proxy
signature.
5 CONCLUSIONS
In this paper, we have shown that strong non-
designated proxy signature schemes and their appli-
cations to multi-proxy signature schemes are vulner-
able to some attacks. The malicious original signer
can forge valid strong non-designated proxy signa-
tures and multi-proxy signatures. Furthermore, the
proxy signer cannot repudiate the forged proxy sig-
natures. Therefore, we have also presented our im-
proved scheme to defeat those attacks.
Lee et al. have also presented several mobile ap-
plications of strong proxy signatures. In (Lee et al.,
2001a), Lee et al. have shown that mobile agents can
be constructed by using strong non-designated proxy
signatures. However, the same attacks on strong
non-designated proxy signatures can be generalized
to work on Lee-Kim-Kim “secure” mobile agents.
Again, our improved scheme can be used here to de-
feat these attacks.
ACKNOWLEDGEMENTS
This work was supported in part by Taiwan Infor-
mation Security Center (TWISC), National Science
Council under the grants NSC 96-2219-E-001-001,
and NSC 96-2219-E-009-013.
REFERENCES
Das, M. L., Saxena, A., and Phatak, D. B. (2007). Proxy sig-
nature scheme with effective revocation using bilinear
pairings. International Journal of Network Security,
4(3):312–317.
Gu, L. Z., Zhang, S., and Yang, Y. X. (2005). An im-
proved proxy multi-signature scheme. The Journal of
China Universities of Posts and Telecommunications,
12(1):10–14.
Guo, L. and Liu, Y. (2006). Security analysis and improve-
ment of hsu et al. threshold proxy signature scheme.
International Journal of Network Security, 2(1):69–
72.
Hwang, M. S., Lin, I. C., and Lu, E. J. L. (2000). A secure
nonrepudiable threshold proxy signature scheme with
known signers. International Journal of Informatica,
11(2):1–8.
Kim, S., Park, S., and Won, D. (1997). Proxy signatures,
revisited. Proc. of ICICS’97, LNCS 1334, pages 223–
232.
Lee, B., Kim, H., and Kim, K. (2001a). Secure mobile
agent using strong non-designated proxy signature. In
Lecture Notes in Computer Science 2119, ACISP 01,
pages 474–486, Sydney, Australia.
Lee, B., Kim, H., and Kim, K. (2001b). Strong proxy signa-
ture and its applications. In The 2001 Symposium on
Cryptography and Information Security, pages 603–
608, Oiso, Japan.
Mambo, M., Usuda, K., and Okamoto, E. (1996a). Proxy
signatures: Delegation of the power to sign message.
IEICE Trans. Fundamentals, E79-A(9):1338–1353.
Mambo, M., Usuda, K., and Okamoto, E. (1996b). Proxy
signatures for delegating signing operation. Proc.
Third ACM Conf. on Computer and Communications
Security, pages 48–57.
Petersen, H. and Horster, P. (1997). Self-certified keys -
concepts and applications. In Communications and
Multimedia Security’97, pages 102–116, Chapman &
Hall.
Sun, H. M. (1999). An efficient nonrepudiable threshold
proxy signature scheme with known signers. Com-
puter Communications, 22(8):717–722.
Tzeng, S.-F., Yang, C.-Y., and Hwang, M.-S. (2002). A
nonrepudiable threshold multi-proxy multi-signature
scheme with shared verification. Proceeding of 12
th
National Conference on Information Security, R.O.C.,
pages 285–292.
SECRYPT 2008 - International Conference on Security and Cryptography
98